The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Identity Security Is Breaking Under the Weight of Silos
Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.

Inside the DIY Scam Economy
Introduction
The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered.
The operations of these criminal groups transcend ...

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training
Cyber threats are happening at an overwhelming pace, and organizations using SAP systems have become favorite targets for cybercriminals. While specialized tools exist, there is a shortage of skilled professionals with expertise in SAP security. The need for training individuals in this area has never been greater.

Rushing AI Adoption? Security Leaders Say to Slow Down
Artificial intelligence isn’t just transforming business. It’s reshaping risk.At the recent Genetec Press Summit in Montréal, Manager and Principal Security Architect, Mathieu Chevalier delivered a presentation that the promise of AI is real, but so are the vulnerabilities.“It feels like everyone is talking about [AI], and with good reason… this ...

Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables
This article discusses how intelligent data infrastructure enables AI adoption and innovation while providing robust cybersecurity protection through features like AI-powered ransomware detection and multi-layered security approaches. The piece emphasizes that while use cases drive technology adoption, secure and resilient data infrastructure is the ...
Security Metrics That Matter
Introduction
Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is ...

Rethinking Cyber Resilience in the Age of AI
AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from ...

Cisco’s Bid to Anchor the Agentic Enterprise
The Shift to Agentic Enterprise AI
Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as ...
No results found.
In The News
Organisations Overlook AI Risk as Governance Fails to Keep Up
TrendAI™ research reveals pressure to deploy AI for business speed is outpacing control, visibility and accountability
Mandiant Report – Why Identity and Cloud Missteps are Fuelling Australia’s Next Wave of Cyber Attacks
Australian organisations are facing a subtle but significant shift in cyber risk — one where attackers no longer need to break in, because they can simply log in.
According to the latest M-Trends report from Google Cloud’s Mandiant division, the global threat landscape is being reshaped by a combination of credential theft, cloud misconfigurations and ...
ESET Launches Cloud Workload Protection and AI Enhancements for ESET PROTECT Customers
● ESET to protect cloud virtual machines (VMs) from advanced threats with its new ESET Cloud Workload Protection module.
● While competitors often offer cloud workload protection as a stand-alone offering, ESET includes it at no additional cost for ESET PROTECT customers.
● Other updates include advanced AI reporting for ESET’s cloud sandboxing ...
DigiCert Releases Latest Tools to Secure Digital Documents and Mitigate AI Fraud
Updates to Document Trust Manager streamline signing and centralise key management
Tanium Accelerates Autonomous IT with AI and Security Innovations
New platform capabilities unveiled at RSAC 2026 conference span Security Operations, Exposure Management and Endpoint Management – driven by AI and real-time intelligence
CrowdStrike Launches the Charlotte AI AgentWorks Ecosystem for Building Secure Agents
Collaboration partners including Accenture, AWS, Anthropic, Deloitte, Kroll, NVIDIA, OpenAI, Salesforce, and Telefónica Tech accelerate agentic SOC transformation for customers with CrowdStrike’s no-code security agent development platform
WatchGuard Expands NDR Capabilities, Making Advanced Network Threat Detection Practical for MSPs and Midmarket Organisations
SYDNEY – 26 March, 2026: WatchGuard® Technologies, a global leader in unified cybersecurity for MSPs, today announced new WatchGuard NDR for Firebox, Managed NDR and Total NDR offerings for organisations to easily deploy and scale AI-powered threat detection that uncovers, investigates and contains malicious activity without added complexity. This ...
Geopolitical Tensions Drive Sustained Surge in Cyber Attacks
Bitdefender has today released new research revealing that cyber attacks linked to geopolitical conflict are escalating in both volume and sophistication, with a 130% increase in phishing and malware campaigns targeting Gulf countries following the recent escalation involving Iran, Israel and the United States.
The research shows a clear inflection ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
